V2X Misbehavior and Collective Perception Service: Considerations For Standardization
V2X Misbehavior and Collective Perception Service: Considerations For Standardization
has changed in a way that would trigger the generation of a profit and, hence, is more predictable in terms of attack means
CAM by this object, it is then included in the next CPM [14]. and attack target.
Highly dynamic objects are therefore more often included in Active versus Passive: An active attacker can generate
transmitted CPMs than slow or static objects. packets or signals to perform the attack, whereas a passive
attacker only eavesdrops the communication channel (i.e.,
C. Authentication of CPMs wireless or in-vehicle wired network).
The CPS specification includes security requirements such Local versus Extended: An attacker can be limited in scope,
as CPM’s integrity, and transmitter’s authenticity. Following even if she controls several entities (vehicles or base stations),
the IEEE 1609.2 [15], message’s integrity and transmitter’s which make her local. An extended attacker controls several
authenticity are ensured by digitally signing every CPM sent. entities that are scattered across the network, thus extending
Receivers use the transmitter’s public key contained in the her scope.
certificate to verify the digital signature attached to the CPM. Direct versus Indirect: A direct attacker reaches its primary
This forces the attacker to have valid credentials to perform target directly, whereas an indirect attacker reaches its primary
attacks on CPMs. target through secondary targets. For instance, an indirect
attacker may compromise a CPM through a sensor attack.
Figure 4 shows an example of attack on an EEBL appli-
D. V2X Applications
cation that uses CPM. This example assumes that the dark
V2X applications rely on V2X messages as an input to warn vehicle fuses its onboard sensors and V2X with equal weight.
the driver or to control the vehicle dynamics to avoid road When detecting conflicting information, it goes in fail-safe
hazard or improving gas consumption. Several safety critical mode. As a first step, an attacker (white vehicle) generates
V2X applications would benefit from using CPM [16]: multiple ghost vehicles (light gray) at specific locations [17].
• Intersection Collision Warning (ICW) Then (step 2), the attacker sends a fake BSM/DENM claiming
• Emergency Electronic Brake Lights (EEBL) an emergency brake along with the CPM reporting a sta-
• Mobile Accessible Pedestrian Signal System (MAPSS) tionary (ghost) vehicle ahead. Finally (step 3), the dark gray
• Pedestrian in Signalized Crosswalk Warning (PSCW) vehicle detects inconsistencies between its sensor readings
• Blind Merge Warning (BMW) and the received information, thus triggering fail-safe mode.
For example, EEBL would benefit from richer information This example demonstrates the importance of assessing data
about the location and cause of the event to enhance EV’s trustworthiness and detecting attacks.
reaction. From a standard perspective, these cross-application
functionalities are unspecified yet. V. T HREAT A SSESSMENT
A. Methodology
IV. ATTACKER M ODEL
Several methodologies assess the risk level for an attack.
To facilitate the TA, we formalize the attacker model
For example, attack trees were used to formalize attacks on
following the classification proposed in [17].
V2V communication [18]. However, in our context, the large
Internal versus External: The internal attacker is an authen-
ticated member of the network that can communicate with
other members. The external attacker cannot properly sign her
messages, which limits the diversity of attacks. Nevertheless, EEBL CPM
1 2 3
she can eavesdrop the V2X broadcast communication.
Malicious versus Rational: A malicious attacker seeks no ?
personal benefits from the attacks, and aims to harm the
members or the functionality of the network. Hence, she may
employ any means disregarding corresponding costs and con-
sequences. On the contrary, a rational attacker seeks personal Fig. 4: Attacking EEBL using malicious CPM
4
TABLE II: Risk ratings and criteria [12] only their location information. Another attack on this field
Criteria High Medium Low is a remote blinding of sensors [19]. In the latter case, the
The attack is reporting vehicle (i.e., sender of CPM) isn’t misbehaving, but
hard to
The attack is
The attack is
reproduce due
is the target of an attack. However, a MBDS could detect
reproducible that the target should have reported the missing objects, and
Reproducibility easily to its
with some
reproducible complexity or hence be classified as misbehaving. This example shows the
limitations
operational
cost.
complexity of designing robust MBDS for CPMs.
The attack The attack
infects the infects the The attack has
system and system and no impacts on C. Conclusion
Impact can lead to can lead to the system but
catastrophic moderate can inflict
Most attacks have high reproducibility (only one has a
damage (e.g., damage (e.g., minor harm medium rating) since they do not require special hardware
an accident) traffic jam) to perform the attack. The impact of 3 out of all attacks in
The attack Tables III and IV have high impact rating since they have the
needs several
Broadcasted potential to put the lives of drivers and pedestrians in jeopardy.
Unknown misbehavior
information
Stealthiness
attack occurs detectors,
readily explain Lastly, these attacks are lowly rated for stealthiness as the
in certain message attacker would be exposing its certificate in the malicious
the
applications types, or data
misbehavior messages and can be easily detected if the suggested defenses
sources to be
detected for each attacks are applied.
Although the attacks we developed have high reproducibility
and impact, we have suggested defense mechanisms that
number of attacks makes the trees too large and unwieldy. should be able to detect such attacks and help report the
Therefore, our methodology follows a matrix approach based malicious actors. These defense mechanisms mainly require
on three criteria: reproducibility, impact, and stealthiness (see redundant information from other honest actors surrounding
Table II). The attack reproducibility aims to assess the level the target vehicle or redundant sensors on the target vehicle.
of ease to replicate the attack. The impact measures how However, as discussed in Section VI, the functional standards
impactful the attack can be on the victim’s car and its sur- are focusing on redundancy mitigation techniques to reduce
rounding vehicles (i.e., criticality and scalability). The attack channel load. Thus, the defense mechanisms can only be
stealthiness assesses the ease by which a driver or a system practically applied if the standards allow room for redundant
can detect it. Accordingly, we assess the overall risk level for information.
each threat based on the majority rating among the criteria.
For attacks that have all three (High, Medium, Low) ratings
VI. D ISCUSSION
in the criteria, the overall rating is taken as Medium.
In this section, we propose standard-related directions to
address some of the security gaps identified by the TA.
B. Summary
We performed a TA of the ETSI TR 103 562 [5], identifying
16 attacks. Out of the 16 attacks, 13 linked to the TR, and 3 A. Misbehavior Detectors and Reporting
were agnostic to the standards. As a result, we found two high, ETSI TR 103 460 and TS 103 759 list a set of misbehavior
six medium, and eight low risk attacks. detectors for CAM. Currently, the TS draft does not specify
Although there are more number of medium and low risk detectors for the CPM, leaving that for a future version.
attacks, some attacks are very easily reproducible and some However, we can assume that detectors (designed for CAM)
have the capability of very high impact to the CPS. We present will be applicable to CPM too. For instance, in TR 103 460,
our analysis in Tables III and IV. the detector, named implausible speed, will be the same for
As described in Section IV, the attacker model considered both CPM and CAM.
has the ability to modify all of the CPM’s containers with any Additional detectors specific to CPM will be needed though.
desired value. A potential detector could use SensorInformationContainer to
One attack on SensorInformationContainer considers sen- detect fake perceived objects. Indeed, an attacker can generate
sors that can only detect objects until 100 meters but the randomly positioned perceived objects in the PerceivedObject-
attacker modifies that value to 200 meters and reports objects Container. A detector should verify if each perceived object is
at 190 meters. This information is evidently false, but a within the sensory perception area. A perceived object outside
receiver can’t corroborate such information individually. the sensor perception area should not have been detected
One attack on FreeSpaceArea is an attacker that falsifies a by the sensor, and thus, most likely does not exist. In a
free space where an object is present. The receiving vehicle similar fashion, a CPM detector could verify if two CPMs
would only be able to corroborate against this information by from different senders are consistent. For instance, a perceived
coming in line-of-sight (LoS) of the claimed free space. object within the perceived area of vehicle A and vehicle B
One attack on PerceivedObjectContainer is when an at- should be part of the CPM sent by vehicle B. This observation
tacker creates fake perceived objects by copying values of could mean vehicle A have inserted a fake perceived object or
other perceived objects (received via CPMs) and modifying vehicle B suppressed the perceived object. Thus, an absence
5
of consistency between the two CPMs may increase at least VII. C ONCLUSION
the suspicious level for both reporting vehicles. CPS offers to V2X-equipped vehicles the ability to ex-
After being detected, a misbehavior report (MBR) may be change richer data to improve further their telematics aware-
generated and sent to authorities for further investigation. The ness and safety. However, the security of CPM is mandatory
ASN.1 definition specified in TS 103 759 should be flexible to guarantee quality data. Standardization efforts of CPS and
enough to allow for CPM detectors. V2X MBD (separately) are ongoing worldwide, but misbehav-
ior protection in CPS still has to be addressed. In this paper,
we provided a summary of a TA done on ETSI TR 103 562,
B. Tension between redundancy mitigation and MBD which identified 16 attacks with mainly low to medium risk
level. From this assessment, we proposed four work items for
If multiple stations perceive the same (physical) object,
consideration in ongoing standardization efforts. We hope this
redundant and unnecessary frequent updates about that object
work could serve as a starting point to tackle the question of
will be broadcast, thereby increasing the network channel
CPS security by standard organizations and regulators.
load. To address this issue, ETSI CPS defined redundancy
mitigation rules. These can be frequency-based, dynamics-
R EFERENCES
based, or confidence-based, and triggered when the observed
[1] SAE, “V2x communications message set dictionary,” J2735, 2020.
channel busy ratio is higher than a predefined threshold [5]. [2] ETSI, “Intelligent Transport Systems (ITS); Vehicular Communications;
However, as noted earlier, the redundancy can be useful to Basic Set of Applications; Part 2: Specification of Cooperative Aware-
detect misbehaviors. An interesting work item could be to ness Basic Service,” EN 103 637-2, 2014.
[3] J.-P. Monteuuis, J. Petit, J. Zhang, H. Labiod, S. Mafrica, and A. Servel,
study this trade-off, and define an approach to balance between ““my autonomous car is an elephant”: A machine learning based detector
redundancy and channel congestion. for implausible dimension,” in Security of Smart Cities, Industrial
Control System and Communications (SSIC). IEEE, 2018.
[4] J. Petit, R. Ansari, and C. Chen. (2020) Misbehavior Detection for
V2X communication. DEFCON 28 Car Hacking Village. [Online].
C. Use of CPM as data source for V2X MBD (and vice versa) Available: https://www.youtube.com/watch?v=xTaksVG9Qi4
[5] ETSI, “Intelligent transport systems (its); vehicular communications;
It can be tempting to use CPM as data source to detect basic set of applications; analysis of the collective perception service
malicious CAM (or to use CAM to detect malicious CPM). (cps); release 2,” ETSI TR 103 562, 2019.
[6] ——, “Intelligent transport system (its); vehicular communications;
For instance, a perceived and connected object in a CPM basic set of applications; specification of the collective perception
may have sent CAM information that are consistent with the service,” ETSI TS 103 324, 2021.
corresponding CPM. However, the use of other message is [7] SAE, “V2x sensor-sharing for cooperative & automated driving,” SAE
J3224, 2019.
not trivial because the CAM and the CPM are received at [8] C. S. of Automotive Engineers, “Cooperative intelligent transportation
different moment in time. A motion prediction algorithm (e.g., system vehicular communication application layer specification and data
Kalman Filter) could tackle this issue. However, the standard exchange standard (phase 2),” CSAE 157, 2020.
[9] ETSI, “Intelligent transport systems (its); security; misbehaviour report-
should make clear if all vehicle shall use the same prediction ing service,” ETSI TS 103759, 2021.
algorithm, and shall provide the temporally synchronized BSM [10] ——, “Intelligent transport systems (its); security; pre-standardization
and CPM in the corresponding MBR. The specification of this study on misbehaviour detection; release 2,” ETSI TR 103 460, 2020.
[11] C. Allig, T. Leinmüller, P. Mittal, and G. Wanielik, “Trustworthiness
approach might impact the ASN.1 definition of the MBR. estimation of entities within collective perception,” in IEEE Vehicular
To further improve the CPMs’ trustworthiness and prevent Networking Conference (VNC), 2019.
attacks on SensorInformationContainer is could be useful to [12] M. Hadded, P. Merdrignac, S. Duhamel, and O. Shagdar, “Security
attacks impact for collective perception based roadside assistance: A
extend the IEEE 1609.2 certificate format to include EV’s study of a highway on-ramp merging case,” in International Wireless
capabilities. This would allow for (authenticated) attestation Communications and Mobile Computing (IWCMC), 2020.
of sensing capabilities. [13] P. Merdrignac, O. Shagdar, S. Tohmé, and J. Franchineau, “Augmented
perception by v2x communication for safety of autonomous and non-
autonomous vehicles,” 7th Transport Research Arena TRA, 2018.
[14] I. Llatser, T. Michalke, M. Dolgov, F. Wildschütte, and H. Fuchs,
D. Misbehavior Detection for sensors and fusion “Cooperative automated driving use cases for 5g v2x communication,”
in IEEE 2nd 5G World Forum (5GWF), 2019, pp. 120–125.
[15] IEEE, “Standard for wireless access in vehicular environments–security
The V2X module of a CAV assumes trustworthy sensor services for applications and management messages,” Std 1609.2, 2016.
data. This assumption is strong as attacks on automotive [16] “The future of v2x: 30 mhz application map we-
RADAR, LiDAR, and camera have been demonstrated [19]. binar,” Mar 2021. [Online]. Available: https://itsa.org/event/
the-future-of-v2x-30-mhz-application-map-webinar/
As highlighted in Tables III and IV, a MBDS using local sen- [17] J.-P. Monteuuis, J. Petit, J. Zhang, H. Labiod, S. Mafrica, and A. Servel,
sors cannot ensure the plausibility of a CPM content. Indeed, “Attacker model for connected and automated vehicles,” in ACM Com-
if sensors can be fooled or jammed by an external attacker, puter Science in Car Symposium, 2018.
[18] J.-P. Monteuuis, A. Boudguiga, J. Zhang, H. Labiod, A. Servel, and
then sensors cannot be a reliable data source for a MBDS. P. Urien, “Sara: Security automotive risk analysis method,” in 4th ACM
Standardizing misbehavior detectors for sensor will allow a Workshop on Cyber-Physical System Security, 2018.
transmitter to insert trusted sensor data in a CPM before its [19] J. Petit and S. E. Shladover, “Potential cyberattacks on automated vehi-
cles,” IEEE Transactions on Intelligent transportation systems, 2014.
transmission. For instance, a machine learning module could [20] B. Nassi, D. Nassi, R. Ben-Netanel, Y. Mirsky, O. Drokin, and Y. Elovici,
verify if the object detected by a sensor has a plausible location “Phantom of the adas: Phantom attacks on driver-assistance systems.”
and motion [20]. Such standardization effort could happen in IACR Cryptol. ePrint Arch., 2020.
the ISO TC22 SC32 committee as part of the future ISO 5083.
6